Chapter 6. Solutions in this chapter:

  • Understanding Network Encryption
  • Using OpenSSH to Encrypt Network Traffic Between Two Hosts
  • Installing OpenSSH
  • Configuring SSH
  • Implementing SSH to Secure Data
  • Distributing the Public Key
  • The SSH Client
  • Summary
  • Solutions Fast Track
  • Frequently Asked Questions

Introduction

In this chapter, you will learn about solutions to deploy strong encryption to enhance network security. Encryption ensures data confidentiality by using algorithms to encrypt data before it is sent over a network. The receiving host then decrypts the data to a readable format. The solutions in this chapter combine both authentication and encryption, and they include a step-by-step guide to implementing encryption over an insecure network ...

Get Next Generation SSH2 Implementation now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.